Lustre 2.15.2 Changelog

From Lustre Wiki
Revision as of 18:17, 11 January 2023 by Adilger (talk | contribs) (→‎Issues fixed between 2.15.1 and 2.15.2: change LU-15983 to reference KFI LND)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Server support for kernels:

  • RHEL 8.7 (4.18.0-425.3.1.el8)

Client support for unpatched kernels:

  • RHEL 8.7 (4.18.0-425.3.1.el8)
  • SLES15 SP4 (5.14.21-150400.24.21.2)
  • Ubuntu 22.04 (5.15.0-33)

Recommended e2fsprogs version:

  • v1.46.2.wc5

Interoperability Support:

  • Clients & Servers: Latest 2.12.X, 2.14

Issues fixed between 2.15.1 and 2.15.2

Release Notes - Lustre - Version Lustre 2.15.2


Bug

   * [LU-9243] - GSS struct definition badness
   * [LU-13813] - conf-sanity test_112: can't put import for mdc.lustre-MDT0000-mdc-*.mds_server_uuid into FULL state after 1475 sec, have DISCONN
   * [LU-15508] - Lnet IPv6 work exposed memory leak in GSS layer
   * [LU-15625] - set_param -P must not be used for root squash
   * [LU-15724] - MDT failover hang
   * [LU-15757] - sanityn test_109: Oops in ll_md_blocking_ast() at umount
   * [LU-15811] - simplify lower/upper AIO/DIO code
   * [LU-15855] - Return -ENOKEY to encrypt-unaware clients if filename is missing
   * [LU-15888] - debian/control is being modified during build, causing builds to be flagged dirty
   * [LU-15911] - Make enable_filename_encryption tunable only available with embedded llcrypt
   * [LU-15986] - Race condition between _debug_req() and ptlrpc_req_drop_rs()
   * [LU-15993] - ofd_commitrw() can leak pages due to failed nodemap
   * [LU-16000] - llog_reader: "Segmentation fault" while reading updatelog record
   * [LU-16012] - RHEL 9.0 LBUG: ASSERTION( buf_size == strlen(secctx_name) + 1 ) failed
   * [LU-16037] - lustre-client-dkms Fails to Install on SLES 15 SP3
   * [LU-16045] - Interop: encryption with older client and newer server
   * [LU-16050] - ofed_info does not show mlnx-ofed-kernel-modules
   * [LU-16056] - rarely directories got created with the wrong permission
   * [LU-16058] - Generation and using of the config.cache in b2_15
   * [LU-16059] - Fix dkms server build installation
   * [LU-16082] - old-style Lustre EA inodes support is broken in newer kernel
   * [LU-16085] - Ubuntu 22.04 sanityn test_106c: supported stx_attributes: got '2030', expected '30'
   * [LU-16090] - Fix Module.symvers path lookup on SUSE
   * [LU-16106] - lnet network NIs go down when they have no peers and check_routers_before_use=1
   * [LU-16131] - Do not depend on libmount during --enable-dist
   * [LU-16231] - Lustre stats header incorrectly using boot time
   * [LU-16233] - SUSE 15 SP3 LTSS kernel version 5.3.18-150300.59.93 and later break lustre build tests
   * [LU-16249] - Kerberos works with krb5i but not with krb5p
   * [LU-16258] - Explicitly support .splice_write
   * [LU-16433] - single client performance regression in SSF workload

Improvement

   * [LU-11407] - Improve stats data
   * [LU-15003] - use client enc_pool for fscrypt
   * [LU-15779] - do not hold object's lock over read bulk
   * [LU-15793] - kernel update [RHEL8.5 4.18.0-348.23.1.el8_5]
   * [LU-15874] - RHEL 9.0 support
   * [LU-15896] - gss/sk_utils.c error: 'DH_check' is deprecated: Since OpenSSL 3.0
   * [LU-15959] - support for SLES 15 SP4
   * [LU-15983] - Reserve KFI LND
   * [LU-16048] - Update ZFS version to 2.1.5
   * [LU-16075] - kernel update [RHEL8.6 4.18.0-372.19.1.el8_6]
   * [LU-16089] - kernel update [RHEL7.9 3.10.0-1160.76.1.el7]
   * [LU-16173] - kernel update [SLES15 SP3 5.3.18-150300.59.93.1]
   * [LU-16174] - kernel update [SLES15 SP4 5.14.21-150400.24.21.2]
   * [LU-16177] - kernel update [RHEL9.0 5.14.0-70.26.1.el9_0]
   * [LU-16222] - RHEL 8.7 support
   * [LU-16269] - kernel update [RHEL8.6 4.18.0-372.32.1.el8_6]
   * [LU-16293] - kernel update [RHEL9.0 5.14.0-70.30.1.el9_0]
   * [LU-16294] - kernel update [SLES15 SP4 5.14.21-150400.24.28.1]
   * [LU-16304] - kernel update [RHEL8.7 4.18.0-425.3.1.el8]